Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/7966
Title: Universal Scanner Tool
Authors: Chakraborty, Sourabh
Keywords: Computer 2016
Project Report 2016
Computer Project Report
Project Report
16MCEI
16MCEI03
INS
INS 2016
CE (INS)
Issue Date: 1-May-2018
Publisher: Institute of Technology
Abstract: of utilizing innovation to break the security obstructions. The Testing Methodology has been accessible for a considerable length of time yet the acknowledg- ment is quite recent. My venture is tied in with testing vulnerable websites. It is made on python Scripts which keeps running on the client's PC, which is platform independent so it runs on any computer on the network. This tool can be utilized to discover distinctive diverse sort of vulnerabilities from the site through which any site can be hacked. In spite of the fact that this sort of hardware is accessible in showcase and utilized by numerous security experts yet it cannot be comprehended by non-tech individuals (layman), hence this tool is designed particularly for non-tech individuals who do not comprehend the se- curity testing situation and can check if the site otherwise contains any malevolent code or whether or not it can be hacked. In the current era, there are loads of programmer in the market who can, without much of a stretch, hack any site and compromise the information of that speci c site. Hence, there is a need of secure and productive site that can handle such sort of digital assault. This tool gives a strategy to secure your site, propose the possible adjustments in the source code and discover the enormous number of vulnerabilities that target site possess. The Mass surveillance tool is extremely powerful to get full access to any PC and get the essential information from that PC for the user. It is a completely undetectable Malware which can bypass any anti-virus signature base as well as heuristic base and become a system le to take access to the computer. It totals the imperative information from the casualties PC and transfer it to the drop box account. It can be used to do surveillance on criminals or terrorist by Law enforcement agencies for national security. It is exceptionally impactful in this advanced age where everybody is utilizing computers and are associated by means of web. There are no tools available in the market to do mass surveillance, and hence it very much customized.
URI: http://10.1.7.192:80/jspui/handle/123456789/7966
Appears in Collections:Dissertation, CE (INS)

Files in This Item:
File Description SizeFormat 
16MCEI03.pdf16MCEI038.27 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.